• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services

Two Crucial Android Bugs Open Door to RCE

You are here: Home / Latest Cyber Security Vulnerabilities / Two Crucial Android Bugs Open Door to RCE
June 2, 2020

Google and Qualcomm the two resolved major vulnerabilities in their June updates.

Google has addressed two important flaws in its hottest month to month Android update that permit distant code execution (RCE) on Android mobile units.

The significant bugs (CVE-2020-0117 and CVE-2020-8597) exist in the Android System space, and would permit a remote attacker working with a specially crafted transmission to execute arbitrary code inside the context of a privileged approach. They affect Android versions 8 to Android 10.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Successful exploitation of the most severe of these vulnerabilities could enable for remote code execution in the context of a privileged procedure,” according to a connected advisory from the Multi-State Data Sharing and Examination Middle (MS-ISAC), sent by means of e mail. “These vulnerabilities could be exploited through various strategies these kinds of as email, world-wide-web browsing and MMS when processing media files.”

Based on the privileges involved with the software, an attacker could then put in systems watch, transform or delete knowledge or develop new accounts with entire person legal rights.

The other flaws impacting System are two large-severity information and facts-disclosure difficulties affecting Android 10 (CVE-2020-0116 and CVE-2020-0119) – and Google offered no technical aspects on them.

The June stability updates also address significant-severity bugs in other regions, together with the Android Framework. These incorporate an elevation-of-privilege (EoP) bug (CVE-2020-0114) in Android 10 that “could allow a local malicious software to bypass person interaction demands in purchase to gain accessibility to added permissions,” in accordance to the security bulletin, issued on Monday.

In the meantime, Google also patched CVE-2020-0115, an EoP bug in Android 8 to Android 10 and CVE-2020-0121, an information and facts-disclosure bug in Android 10.

There are also two patches for the Android Media Framework, like CVE-2020-0118, which could permit a community malicious application to bypass user conversation requirements in get to get entry to added permissions it affects Android 10. The other is an information disclosure bug (CVE-2020-0113) influencing Android 9 and 10.

And lastly, there are three higher-severity security bugs in Android’s kernel parts. The most significant of them (CVE-2020-8647) could permit a regional attacker working with a specially crafted application to execute arbitrary code inside the context of a privileged course of action. The other two (CVE-2020-8648 and CVE-2020-8428) are also detailed as superior-severity.

Google also updated the advisories for two older bugs: CVE-2019-2219, influencing Framework for Android 8 to Android 10, could enable a nearby malicious application to bypass working process protections that isolate application information from other programs and an EoP vulnerability in Process (CVE-2019-9460) could enable a remote attacker to bypass user interaction necessities in get to achieve entry to additional permissions.

In all, June is a reasonably mild regular bulletin past month’s Android updates dealt with 39 vulnerabilities.

There ended up also patches issued this week to address numerous vulnerabilities in Qualcomm closed-source and common components utilised in Android devices.

Two of the bugs are critical and can be remotely exploited they both exist in the information-modem place of Qualcomm’s cell chips.

The flaw tracked as CVE-2019-14073 arises for the reason that the process buffers duplicate devoid of checking the dimension of the input in the modem facts, according to Qualcomm’s advisory.

“Copying [real-time transport protocol control protocol] RTCP messages into the output buffer without the need of examining the destination buffer dimension which could guide to a distant stack overflow when processing significant information or non-standard suggestions messages,” in accordance to the silicon-maker.

Also, CVE-2019-14080 stems from improper validation of the array index in the modem details, acquiring to do with ability transmission in the chipset:

“Out of certain produce can happen thanks to lack of check out of array index price although parsing [session description protocol] SDP attribute for [specific absorption rate] SAR,” Qualcomm claimed.

Concerned about the IoT security difficulties enterprises experience as additional related gadgets operate our enterprises, drive our production strains, track and deliver healthcare to patients, and a lot more? On June 3 at 2 p.m. ET, sign up for renowned security technologist Bruce Schneier, Armis CISO Curtis Simpson and Threatpost for a Cost-free webinar, Taming the Unmanaged and IoT Machine Tsunami. Get exceptional insights on how to handle this new and growing attack area. Remember to register below for this sponsored webinar.

Previous Post: « Extreme Cisco DoS Flaw Can Cripple Nexus Switches
Next Post: Essential SAP ASE Flaws Allow for Entire Manage of Databases »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.